Investigating Phishing with OSINTWhen we are investigating a Phishing attack, it can happen that the malicious link inside of it is currently unavailable. But, fortunatelly…Jun 26Jun 26
[Malware Studies] PhenakiteSince my last malware analysis post was about an Android malware, I’ve decided to start to analyze malwares that target iOS devices. This…Jun 15Jun 15
(2023) My year in cybersecurity booksIncident Response with Threat Intelligence - Roberto MartinezDec 25, 2023Dec 25, 2023
[Malware Studies] VikingHordeIt’s been a long time but I decided to write another analysis of a binary obtained in theZoo. This time it’s about an Android application.Nov 15, 2023Nov 15, 2023
Using the different kinds of strings in Yara rulesIf you are into cybersecurity and are passionate about ares like Malware Analys or Detection Engineering, you problaby know about Yara…Jul 26, 2023Jul 26, 2023
(2022) My year in cybersecurity booksPractical Social Engineering: A Primer for the Ethical Hacker - Joe GrayJan 11, 2023Jan 11, 2023
[Malware Studies] LockyIn my second text about Malware Studies, this time I’ll show the analysis made in Locky Ransomware. Like the previous post, this executable…Dec 1, 2022Dec 1, 2022
[Malware Studies] CerberI’m been focusing my studies in Reverse Engineering and Malware Analysis. The approach that I’m following is downloading the theZoo’s…Aug 20, 2022Aug 20, 2022
Solving Step 2 of Downtown Murderer without using reverse image search — HacktoriaHacktoria’s monthly CTF in May was Downtown Murderer. There were 6 steps and I will focus in Step 2, which consists in geolocate three…Jun 3, 2022Jun 3, 2022
[Write-up] LetsDefend — Suspicious Mshta BehaviorFor those who don’t know, LetsDefend is a plataform where, among other things, simulates a SOC and there are some alerts to be resolved…Apr 6, 2022Apr 6, 2022